Equifax Cyberattack: A Short Synopsis of this Attack and its Potential Impact on your Business On March 2, 2017, the Apache foundation disclosed (initially reported by security researcher Nike Zheng et al via - https://cwiki.apache.org/confluence/display/WW/S2-045 and https://cwiki.apache.org/confluence/display/WW/S2-046) that a critical vulnerability, with multiple vectors, exist in the Jakarta based file upload Multipart parser used in Apache Struts2, that could… Lire la suite Equifax Cyberattack: The Impact On Your Business
How Rampant Software Feature Upgrades increases your network attack surface and makes your business the perfect next cyberattack Target?
Petya Ransomware: 3 Things To Limit Your Exposure
Here is a reminder checklist of all the requirements to implement in your company to be compliant.
From the router that provides access to the Internet in the home to the infrastructure of the top modern cities, the best security practices should be applied to protect data, information and privacy. The threat of cyber-attacks on infrastructure is increasing, whether from terrorists, commecial hackers seeking valuable information, or simply bored people seeking a… Lire la suite Cyber-Security: 5 Types of Security Incidents You Should Know
Microsoft could have slowed the devastating spread of ransomware WannaCry to businesses, reports the Financial Times. Instead, it held back a free repair update on machines running older software like Windows XP.
Protecting a company is not a project; it is a process. The technologies used to protect endpoints should be evaluated on an ongoing basis by a security team, as should the protection of the perimeter and servers.
Multiven Summary on WannaCrypt Malware ( Last updated: 15th of May 2017)
Cisco fixes CIA Exploit in IOS and IOS-XE